Abstract: Introduced new paradigms and is increasingly contributing to the enhancement of banking quarter products. The purpose of this article is to examine a few of the most important and well-known enabled banking zone offers, as well as their current benefits and challenges. The fake cheque scam is one of the most prevalent methods of defrauding people. There is currently no method for rapidly authenticating cheque and detecting bogus ones. Instead, banks must wait for a longer length of time to uncover the fraud. More specifically, our solution enables banks to communicate information about provided and used cheque while protecting the personal information of bank clients. Fake cheque can take many different shapes. They could appear to be commercial or personal cheque
Description:Figure 1 Credit cards have long been the most popular mode of payment in ecommerce, and this trend is unlikely to change anytime soon.
Credit card payments, as they are now utilized, are not suitable for anonymous or
pseudonymous payments.
Credit card payments reveal a consumer's name to the retailer, and the credit
card issuer knows exactly where the customer makes payments.
The Secure Electronic Transaction (SET) protocol improves the security of
credit card payments made over the Internet, but it offers little to protect the
customer's privacy.
The Pseudonymous Secure Electronic Transaction (PSET) protocol is described
in this study. PSET is a SET extension that allows for online credit card
payments using a pseudonym.
Pseudonymous payments imply that none of the parties engaged in the payment
process can simultaneously learn the identities of both the client and the
merchant.
This is accomplished by disseminating information about the entire transaction
among the parties involved.
PSET, on the other hand, ensures that none of the parties involved can cheat,
and that in the event of a disagreement, the identity of a pseudonymous
consumer can be resolved unambiguously , Claims:We claim that,
1. Ensuring the detection of Fake Cheques in digital mode.
2. Prevention of Cheque scam in digital mode.
3. Secure Hash Function (SHA) algorithm used for creation and
management of address and also used for transaction verification.
4. Digital Signature Algorithm (DSA) used for signature verification.
| # | Name | Date |
|---|---|---|
| 1 | 202241028133-FER.pdf | 2022-09-07 |
| 1 | 202241028133-STATEMENT OF UNDERTAKING (FORM 3) [17-05-2022(online)].pdf | 2022-05-17 |
| 2 | 202241028133-COMPLETE SPECIFICATION [17-05-2022(online)].pdf | 2022-05-17 |
| 2 | 202241028133-REQUEST FOR EXAMINATION (FORM-18) [17-05-2022(online)].pdf | 2022-05-17 |
| 3 | 202241028133-DRAWINGS [17-05-2022(online)].pdf | 2022-05-17 |
| 3 | 202241028133-REQUEST FOR EARLY PUBLICATION(FORM-9) [17-05-2022(online)].pdf | 2022-05-17 |
| 4 | 202241028133-FORM 1 [17-05-2022(online)].pdf | 2022-05-17 |
| 5 | 202241028133-DRAWINGS [17-05-2022(online)].pdf | 2022-05-17 |
| 5 | 202241028133-REQUEST FOR EARLY PUBLICATION(FORM-9) [17-05-2022(online)].pdf | 2022-05-17 |
| 6 | 202241028133-COMPLETE SPECIFICATION [17-05-2022(online)].pdf | 2022-05-17 |
| 6 | 202241028133-REQUEST FOR EXAMINATION (FORM-18) [17-05-2022(online)].pdf | 2022-05-17 |
| 7 | 202241028133-FER.pdf | 2022-09-07 |
| 7 | 202241028133-STATEMENT OF UNDERTAKING (FORM 3) [17-05-2022(online)].pdf | 2022-05-17 |
| 1 | 202241028133E_06-09-2022.pdf |